Tag Archives: Security role

Several common design principles are used when creating the base 80+ security roles included in AX 2012. These design principles include the following: • Roles represent the common access rights that are required for the job positions within an organization. • Roles account for the organization size, culture and industry focus. • Users are assigned to one or more roles according to their job. • Role types.

Functional role: for example: Warehouse worker.

Organization role: for example: Employee.

Application role: for example: System User.

• Role segregation categories: Functional roles are designed to accommodate segregation of duties. Different categories of roles exist that each focus on their type responsibilities.

Validation: Clerks focus on recording transactions.

Verification: Verifies validate the correctness of recorded transactions.

Authorization: Supervisors authorize processing of the transactions.

Management: Managers review transactions periodically and apply changes to the process as appropriate.